Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
JNCA
2011
281views more  JNCA 2011»
9 years 7 months ago
A link stability-based multicast routing protocol for wireless mobile ad hoc networks
  Recently, several studies have been conducted to design mobility‐based multicast routing protocols for    wireless mobile ad hoc networks (MANET). These ...
Javad Akbari Torkestani, Mohammad Reza Meybodi
JNCA
2011
102views more  JNCA 2011»
9 years 7 months ago
Multi-objective zone mapping in large-scale distributed virtual environments
In large-scale distributed virtual environments (DVEs), the NP-hard zone mapping problem concerns how to assign distinct zones of the virtual world to a number of distributed serv...
Ta Nguyen Binh Duong, Suiping Zhou, Wentong Cai, X...
JNCA
2011
130views more  JNCA 2011»
9 years 11 months ago
Hybrid Zigbee RFID sensor network for humanitarian logistics centre management
Huanjia Yang, Lili Yang, Shuang-Hua Yang
JNCA
2011
92views more  JNCA 2011»
9 years 11 months ago
Load-balancing mechanism for the RFID middleware applications over grid networking
Yi-Wei Ma, Han-Chieh Chao, Jiann-Liang Chen, Cheng...
JNCA
2011
185views more  JNCA 2011»
9 years 11 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke
JNCA
2011
137views more  JNCA 2011»
9 years 11 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
JNCA
2011
97views more  JNCA 2011»
9 years 11 months ago
Security analysis of wireless mesh backhauls for mobile networks
Frank A. Zdarsky, Sebastian Robitzsch, Albert Banc...
JNCA
2011
123views more  JNCA 2011»
9 years 11 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
JNCA
2011
126views more  JNCA 2011»
9 years 11 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou
books